<?xml version="1.0" encoding="UTF-8"?>
<urlset xmlns="http://www.sitemaps.org/schemas/sitemap/0.9" xmlns:image="http://www.google.com/schemas/sitemap-image/1.1" xmlns:xhtml="http://www.w3.org/1999/xhtml">
  <url>
    <loc>https://www.security-embedded.com/blog</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2021-05-03</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/5/principia-securitas-how-to-mitigate-threats</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-06</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/6/write-and-execute-never-at-the-same-time</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/6/crypto-is-a-munition-for-a-reason</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/6/30/breaking-badly-designed-hardware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-01</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/8/firmware-updates-gone-wrong-part-2</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-08</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/8/what-are-you-leaving-on-the-fr4-table</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-08</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1467996117707-XMABXYJZA38F2MBGPUTE/image-asset.jpeg</image:loc>
      <image:title>The Id of IoT Blog - What Are You Leaving on the FR4* Table?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1467996054409-VRJ9CV2DZXJFUB191IMM/image-asset.jpeg</image:loc>
      <image:title>The Id of IoT Blog - What Are You Leaving on the FR4* Table?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/7/firmware-updates-gone-wrong-part-1</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-07</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/11/whats-in-a-firmware-load</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-11</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/10/after-hardware-comes-firmware</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-10</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/18/hardware-software-and-embedded-trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-18</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/12/plaintext-symmetric-keys-fixed-ivs-oh-my</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468330523639-WS43BT25FHYTQ1LC0XRI/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - Plaintext Symmetric Keys, fixed IVs, oh my!</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468330721753-0UYLOVQNIC9VCF9Y3MNL/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - Plaintext Symmetric Keys, fixed IVs, oh my!</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468330627086-S7KWZ3GJ62XYHFYLC1I7/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - Plaintext Symmetric Keys, fixed IVs, oh my!</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468330744563-XSY5KZ5ZBLB3BNNZ1944/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - Plaintext Symmetric Keys, fixed IVs, oh my!</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468330574966-GHBHW1C3URMA0T92RTVC/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - Plaintext Symmetric Keys, fixed IVs, oh my!</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468330700036-PABQ65FVQA3BDHD45KYB/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - Plaintext Symmetric Keys, fixed IVs, oh my!</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/13/attacking-crypto-using-stolen-keys</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-13</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468417457707-BQ4I1CFRMPM7TFKG1GXH/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - Attacking Crypto Using Stolen Keys</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468417211813-9B9BUXV07W7E3BXFD1V8/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - Attacking Crypto Using Stolen Keys</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468417164942-O995TN776ZI7GZ5R9T2N/Wireshark-Startup-Screenie.png</image:loc>
      <image:title>The Id of IoT Blog - Attacking Crypto Using Stolen Keys</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468417241678-FPA9FL0MZ7GHQIEWCDO8/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - Attacking Crypto Using Stolen Keys</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/16/is-fixing-keys-the-worst-sin</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-08-23</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468708030361-O3JBCPK3JM65C83FRCDM/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - Is Fixing Symmetric Keys The Worst Sin?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468708170791-GSAJBK39K6LSUJNLQ21A/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - Is Fixing Symmetric Keys The Worst Sin?</image:title>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468708135393-JWRT1RXF7YI03R0FUEHX/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - Is Fixing Symmetric Keys The Worst Sin?</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/22/malloc-is-an-antipattern</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-22</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/15/firmware-updates-gone-wrong-part-3</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-16</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/12/how-trustworthy-is-that-app-with-those-capabilities</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-12</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468365690715-0A4789SPN9O2QY5N77DK/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - How Trustworthy is that App with those Capabilities?</image:title>
      <image:caption>Click to expand</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468365543026-1FMOLFFIAR778GG91DLI/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - How Trustworthy is that App with those Capabilities?</image:title>
      <image:caption>Click to expand</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1468365611667-QUV3EIVQSBIDJUOD725Z/image-asset.png</image:loc>
      <image:title>The Id of IoT Blog - How Trustworthy is that App with those Capabilities?</image:title>
      <image:caption>Click to expand</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/24/do-you-need-an-os</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-31</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/8/21/when-null-is-a-valid-address</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-08-22</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/8/16/control-the-command-conversation</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-08-17</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/8/8/cryptography-does-not-always-mean-encryption</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-08-09</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/7/30/theres-no-security-without-entropy</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-07-30</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/8/7/the-challenges-of-a-lightweight-secure-channel</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-08-07</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2016/8/28/securing-ble-links</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2016-08-31</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2017/1/16/weaponizing-reverse-engineered-knowledge</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-01-16</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2017/3/18/security-specifications-for-the-layperson</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-03-18</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2017/12/9/a-pragmatic-look-at-trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2017-12-09</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2018/8/12/a-treatise-on-voting-machines</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2018-09-04</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1534088305064-7IVD0M8XVW2GMQAWN5Z2/Fig1.jpg</image:loc>
      <image:title>The Id of IoT Blog - A Treatise on Voting Machines</image:title>
      <image:caption>Figure 1: The Victim</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1534088576318-S2M8U7KWUAXRJSZCF0HI/Fig2.jpg</image:loc>
      <image:title>The Id of IoT Blog - A Treatise on Voting Machines</image:title>
      <image:caption>Figure 2: The victim, laid bare. Note the useful silkscreen all over the board, handy to figure out how the device is supposed to work. Also of note, every part is well-documented and broadly used, from the SM501 system controller, to the Intel PXA CPU, through to the touchscreen digitizer. Not one of these parts provides a real security model.</image:caption>
    </image:image>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1534088591490-LII8OLM9IW9HO6BD7FQ8/Fig3.jpg</image:loc>
      <image:title>The Id of IoT Blog - A Treatise on Voting Machines</image:title>
      <image:caption>Figure 3: in which a JTAG probe is used to read and write the software image</image:caption>
    </image:image>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2020/11/14/application-trust-is-hard-but-apple-does-it-well</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2020-11-30</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1605374979939-GVMQ01WNEH41LC8ONUJ8/image.jpg</image:loc>
      <image:title>The Id of IoT Blog - Application Trust is Hard, but Apple does it Well</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2021/2/14/we-are-not-at-the-precipice-of-a-gps-disaster</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-02-14</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1613319241304-Y62T4Q1PE9SKGDPS066P/launch-dec18.jpg</image:loc>
      <image:title>The Id of IoT Blog - We are not at the Precipice of a GPS Disaster</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/2021/5/2/under-the-hood-webauthn-in-safari</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
    <lastmod>2021-05-06</lastmod>
    <image:image>
      <image:loc>https://images.squarespace-cdn.com/content/v1/5775b14046c3c47936f1b9cb/1620002862912-5HM7CKKBIBRVCZNEG3EI/unsplash-image-ktWur2xM1hs.jpg</image:loc>
      <image:title>The Id of IoT Blog - Under the Hood of WebAuthn in Safari</image:title>
    </image:image>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/category/Meta</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/category/Principia+Securitas</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/category/Wireless+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/category/Miscellany</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/category/Crypto+Disasters</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/category/Embedded+Design+Practices</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/category/Hardware+Security</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/tag/Wireless</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/tag/sdr</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/tag/trust</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/tag/elliptic+curve</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/tag/identity</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/tag/BLE</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/tag/Impending+Crypto+Disasters</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/tag/wireless</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/blog/tag/crypto</loc>
    <changefreq>monthly</changefreq>
    <priority>0.5</priority>
  </url>
  <url>
    <loc>https://www.security-embedded.com/home</loc>
    <changefreq>daily</changefreq>
    <priority>1.0</priority>
    <lastmod>2024-07-12</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/archive</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-07-06</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/contact</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2020-01-16</lastmod>
  </url>
  <url>
    <loc>https://www.security-embedded.com/services</loc>
    <changefreq>daily</changefreq>
    <priority>0.75</priority>
    <lastmod>2016-07-18</lastmod>
  </url>
</urlset>

